Results 71 to 80 of about 51,827 (294)

Securing Cloud from Cloud Drain

open access: yes, 2014
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues,
Das, Niva, Sarkar, Tanmoy
openaire   +2 more sources

Cloud Access Security Brokers (CASBs): Enhancing Cloud Security Posture

open access: yes, 2023
Cloud Access Security Brokers (CASBs): Enhancing Cloud ...
openaire   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Principles for Rigorous Design and Application of Synthetic Microbial Communities

open access: yesAdvanced Science, EarlyView.
SynComs are artificially designed to enable inter‐species metabolic interactions, metabolic division of labor, and ecological interactions that can elicit phenotypes like colonization stability and environmental adaptation. This systematic review explores the processes used to construct SynComs, the assessment of the mechanisms of metabolic interaction
Yuxiao Zhang   +21 more
wiley   +1 more source

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

Gecko‐Inspired Adhesive for Robotic Grippers with Excellent Ultra‐Low‐Temperature Adhesion Performance

open access: yesAdvanced Science, EarlyView.
Phenyl and vinyl groups are used to modify conventional polydimethylsiloxane (PDMS) to yield poly(methylphenylvinylsiloxane) (PMPVS). PMPVS‐based gecko‐inspired arrays with mushroom tips exhibit superior adhesion strength of 36.7 kPa even at −80 °C, which enhances by 5143% compared to PDMS‐based arrays (0.7 kPa at −70 °C).
Jiabao Feng   +6 more
wiley   +1 more source

Targeting the CMKLR1‐Mediated Signaling Rebalances Immunometabolism State in Middle‐Age Testicular Macrophages

open access: yesAdvanced Science, EarlyView.
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu   +10 more
wiley   +1 more source

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

open access: yesCybernetics and Information Technologies, 2019
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy